Guest User!

You are not Sophos Staff.

Which is the difference between exclusions to SSL/TLS inspection rules under rules and policies and under Web Menu?

Exclusions to SSL/TLS inspection rules

XG Firewall provides default exclusion rules for websites and applications. These rules are positioned at the top of the SSL/TLS inspection rule table and are evaluated first. You can’t change their sequence in the rule table.

To the default exclusion rules, add only applications and websites that you don’t want to decrypt in any SSL/TLS inspection rule.

To exclude traffic from decryption using other criteria, you can create additional rules with action set to Do not decrypt and place them immediately below the default rules.

Exclusions by website or category: Contains the following exclusion lists:
  • Local TLS exclusion list: The list is empty by default. You can’t delete it from the exclusion rule. You can add domains to this list based on troubleshooting outcomes. Websites excluded through the control center or the log viewer are also added to this list. To edit this list, go to Web > URL groups.
  • Managed TLS exclusion list: Contains domains known to be incompatible with SSL/TLS inspection and is updated through firmware updates. You can, however, remove the list from the exclusion rule.

Exclusions by application: The list is empty by default. To add to the list, select the exclusion rule and add the Synchronized Security applications. Applications excluded through the control center are also added to the list.

 

Please document the differences between this new tab/option from exceptions available in Web > exceptions. Which one takes precedence?

Thanks

Parents Reply Children
  • I put some time into this, because it could be confusing in the current state for new people in V18. 

     

    It is quite easy, if you understand the underlaying services. 

     

    The firewall rule will simply "allow" the service. In the firewall Rule you can activate the Web proxy (of V17.5). This proxy is acting on Port 443/80.

    The new SSLx Engine is working on all Ports, so to speak it can actually scan all applications, ports etc. 

     

    If you decrypt all ports with SSLx (the third part), it will do it on all ports. 

    If some traffic is decrypted on port 443, it will "automatically" give this traffic to the build in proxy and all configuration matching in proxy will take care of this traffic (can i open google.de etc.).

    If you activate the configuration on the right of the firewall policy, it will activate the proxy and prioritize the traffic for 443/80. It will not be stream based, instead it is a actual proxy.

     

    So most likely: create a SSLx rule for LAN to WAN.

    Set your Web proxy rule (allow traffic etc.) in the drop done rule and allow the traffic - You should be fine. 

     

    If you observe a application / service / etc. not working with decryption, start to investigate the log viewer (new option --> TLS).